Options to NAT Porxy Server

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Options to NAT Porxy Server

L0 Member

Background:  10000 or so clients connect to the Internet through a cluster of proxy servers.  The proxy servers sit on the inside of the network and share a single outside NAT address.  So all external web related requests come from the same outside NAT address.

 

Problem:  Cloud services using Akamai and Amazon will periodically block our proxy servers outside NAT addresses.  IT appears that the proxy server outside address is getting blocked because it exceeded some rate limit implemented by the cloud service provider.

 

One solution we are investigating is to create a dynamic ip and port nat policy for the proxy servers with multiple outside public addresses.  But how does that work?  In my experience a dynamic ip and port policy will uses the first IP in the pool until all the ports are exhausted.  So we would have to have 65000 or so concurrent web requests before the pool would roll over to the next ip.  This wouldnt fix our problem.

 

It there a way set a NAT policy so the Palo will round robin each address in the pool?

What have other engineers done to fix this problem?  We cant be the only ones that have run into this issue?

Thanks

Joe

1 REPLY 1

L6 Presenter

Hi @jlombardo 
Check if this article helps you.

M

Check out my YouTube channel - https://www.youtube.com/@NetworkTalks
  • 921 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!